The NetBSD Project is pleased to announce NetBSD 7.1.1, the first security/critical update of the NetBSD 7.1 release branch. It represents a selected subset of fixes deemed important for security or stability reasons.

Complete source and binaries for NetBSD 7.1.1 are available for download at many sites around the world. A list of download sites providing FTP, AnonCVS, and other services may be found at https://www.NetBSD.org/mirrors/. We encourage users who wish to install via ISO or USB disk images to download via BitTorrent by using the torrent files supplied in the images area. A list of hashes for the NetBSD 7.1.1 distribution has been signed with the well-connected PGP key for the NetBSD Security Officer: https://ftp.NetBSD.org/pub/NetBSD/security/hashes/NetBSD-7.1.1_hashes.asc

NetBSD is free. All of the code is under non-restrictive licenses, and may be used without paying royalties to anyone. Free support services are available via our mailing lists and website. Commercial support is available from a variety of sources. More extensive information on NetBSD is available from our website: www.NetBSD.org

Changes Between 7.1 and 7.1.1

Below is an abbreviated list of changes in this release. The complete list can be found in the CHANGES-7.1.1 file in the top level directory of the NetBSD 7.1.1 release tree.

The following security advisories were fixed:

NetBSD-SA2017-004 buffer overflow via cmap for 4 graphics drivers.

NetBSD-SA2017-005 x86: vulnerabilities in context handling.

NetBSD-SA2017-006 Vnode reference leak in the openat system call.

NetBSD-SA2018-001 Several vulnerabilities in context handling

NetBSD-SA2018-002 Local DoS in virecover

Note: Advisories prior to NetBSD-SA2017-004 do not affect NetBSD 7.1.1.

Userland changes

dhcrelay(8): Fix bug that prevented proper operation when run in the background.

Heimdal:

Update to 7.1.

Fix CVE-2017-11103.

mtree(8): Don't modify strings stored in hash, otherwise filling up of directory hierarchy stops if the same hash value occurs in directory and leaf.

ping(8): Fix cksum calculation for clearing the cached route.

resize_ffs(8): Fix numerous overflow errors which can lead to superblock corruption on large filesystems.

rtadvd(8): Fix the default value of rltime. PR bin/51994.

Update BIND to 9.10.5-P2.

Update expat to 2.2.1.

Update ntp to 4.2.8p10.

Update root.cache to 2017102400.

Update tzdata to 2017c.

vi(1): Don't garble display when when resizing nvi in xterm.

wpa_supplicant/hostapd:

Update to 2.6.

Apply fixes for CVEs 2017-13077 through 2017-13082 and CVEs 2017-13086 through 2017-13088.

Fix incorrect setting of O_NONBLOCK and potentially other flags in cloning devices from uninitialized garbage.

Fix numerous kernel memory leaks.

Fix out of bound read in getcwd_scandir().

Fix panic in compat getdents triggered by puffs userland.

Fix panic when unloading swsensor module.

i82596: Fix double free in iee_init()/iee_stop().

ipfilter: Fix use after free issues and resulting panic.

ipw(4): Fix double free in ipw_dma_alloc().

ipfilter: Disconnect maintaining fragment state from keeping session state. The user now must specify keep frags along with keep state to have ipfilter do what it did before, as documented in ipf.conf.5.

isp(4): Unvalidated channel index in ISP_FC_GETDLIST case of ispioctl() can cause out of bound read.

lua(4): Fix kernel crash when memory allocation fails. PR kern/52225.

netsmb: Fix out of bound reads in smb_usr_vc2spec and smb_usr_t2request.

Provide EVFILT_WRITE for the sake of Go.

ural(4): Free the RX list if ural_alloc_rx_list fails part way through.